Overview
overview
10Static
static
10Instagram.apk
android-9-x86
1Instagram.apk
android-10-x64
1Instagram.apk
android-11-x64
1dropbox.html
windows7-x64
1dropbox.html
windows10-2004-x64
1facebook_d...e.html
windows7-x64
1facebook_d...e.html
windows10-2004-x64
1facebook_d...c.html
windows7-x64
1facebook_d...c.html
windows10-2004-x64
1facebook_mobile.html
windows7-x64
1facebook_mobile.html
windows10-2004-x64
1facebook_m...y.html
windows7-x64
1facebook_m...y.html
windows10-2004-x64
1garena_free_fire.html
windows7-x64
1garena_free_fire.html
windows10-2004-x64
1github.html
windows7-x64
1github.html
windows10-2004-x64
1instagram.html
windows7-x64
1instagram.html
windows10-2004-x64
1jquery.js
windows7-x64
1jquery.js
windows10-2004-x64
1linkedin.html
windows7-x64
1linkedin.html
windows10-2004-x64
1messenger.html
windows7-x64
1messenger.html
windows10-2004-x64
1microsoft.html
windows7-x64
1microsoft.html
windows10-2004-x64
1netflix.html
windows7-x64
1netflix.html
windows10-2004-x64
1paypal.html
windows7-x64
1paypal.html
windows10-2004-x64
1protonmail.html
windows7-x64
1Analysis
-
max time kernel
136s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
30/09/2023, 02:20
Behavioral task
behavioral1
Sample
Instagram.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
Instagram.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral3
Sample
Instagram.apk
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral4
Sample
dropbox.html
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
dropbox.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral6
Sample
facebook_desktop_homepage.html
Resource
win7-20230831-en
Behavioral task
behavioral7
Sample
facebook_desktop_homepage.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral8
Sample
facebook_desktop_static.html
Resource
win7-20230831-en
Behavioral task
behavioral9
Sample
facebook_desktop_static.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral10
Sample
facebook_mobile.html
Resource
win7-20230831-en
Behavioral task
behavioral11
Sample
facebook_mobile.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral12
Sample
facebook_mobile_fake_security.html
Resource
win7-20230831-en
Behavioral task
behavioral13
Sample
facebook_mobile_fake_security.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral14
Sample
garena_free_fire.html
Resource
win7-20230831-en
Behavioral task
behavioral15
Sample
garena_free_fire.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral16
Sample
github.html
Resource
win7-20230831-en
Behavioral task
behavioral17
Sample
github.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral18
Sample
instagram.html
Resource
win7-20230831-en
Behavioral task
behavioral19
Sample
instagram.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral20
Sample
jquery.js
Resource
win7-20230831-en
Behavioral task
behavioral21
Sample
jquery.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral22
Sample
linkedin.html
Resource
win7-20230831-en
Behavioral task
behavioral23
Sample
linkedin.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral24
Sample
messenger.html
Resource
win7-20230831-en
Behavioral task
behavioral25
Sample
messenger.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral26
Sample
microsoft.html
Resource
win7-20230831-en
Behavioral task
behavioral27
Sample
microsoft.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral28
Sample
netflix.html
Resource
win7-20230831-en
Behavioral task
behavioral29
Sample
netflix.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral30
Sample
paypal.html
Resource
win7-20230831-en
Behavioral task
behavioral31
Sample
paypal.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral32
Sample
protonmail.html
Resource
win7-20230831-en
General
-
Target
instagram.html
-
Size
11KB
-
MD5
b14c3a18a600742ad0f56f809bf8e240
-
SHA1
57043b5449e49184dd6566ad1566176f004d1a3c
-
SHA256
1a2222182c54fc1627b803657eef8a7f5da98390af508b0035be3a3129204f27
-
SHA512
d39482dce371cd945ea77d2ad49628bd59130efc8bb9c649db614356f26a0810208d0784cf10e1b69812d313f1b1955fd1e89a2ccb26659ea787ab4f9cb3fb5b
-
SSDEEP
96:JUzNmNGcQ75tDzcic0JFBk+oTBW+WzRoIRcAKc1W7ZTitcSJMAinRtw/11URqdGF:GzNmNQ5Rr7BtTOZeZqRqdGX3F
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F747D501-5F37-11EE-AB7A-7EFDAE50F694} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4020b4cd44f3d901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "402202314" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003916b9f19191c547a3cd833648cc0b6b00000000020000000000106600000001000020000000a1043c0b786a5f2ef41c8a993c748480f6fb96185164e7e93db3e841d22b472f000000000e800000000200002000000041ab236078bd2f7123cb951e0cecbc7f67f953beea001c31219f090a1faecea420000000b3418a1501347eea7d953b361a8e21156e243ca78618fd6359bc9e9f5ced2f7740000000c250813ac3e42eee4e96982ca850edac6f8eba6f4e0b7af020e9a69929373c52fb1f9fb65bff8893e967f68ab740c51fd4d7bfd7f61b7c0f22c44dee80564e6a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2996 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2996 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2996 iexplore.exe 2996 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2996 wrote to memory of 2748 2996 iexplore.exe 28 PID 2996 wrote to memory of 2748 2996 iexplore.exe 28 PID 2996 wrote to memory of 2748 2996 iexplore.exe 28 PID 2996 wrote to memory of 2748 2996 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\instagram.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2996 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5aa90c4c10ba1a9e926eb4063c65b3b40
SHA1c16f3a7b83837818e89e20e376d664058237cf4b
SHA256c8c2d001a98b3c3db1a0ed77a370f398bf76d2b5be73e9bac614efc34d5e6c4b
SHA512c055bba096c76c544f2a29954921969f28659d0ed1a7e65c06f05bf596d9c48db0ac19188c5e0d799a31c6c3c083e971de1cc6c840766f18398291408f7f5ba8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58af0b7070f5c99ceef8bdaf9689d7d4e
SHA199f8aff0f1ab6161039c1e8255af5054ced697e2
SHA25670a06d1a04115911bbe86e7037ce17fec00831f0825576870c91016a48870f69
SHA51297c0f3599a6b2c17ff104aea6f95083cb98d6e5ba926bc7bedaa4476c5b885744a24cce28bbc7200396be7ff036e7efab4f01607f7b16c1aa37d8bfd0689282a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56a689ec68dd34e7e72bd5f77c14e814b
SHA15c67afc7cb92bbf0a0821830fbf4fda7fcd53672
SHA256bdd9f2d494cd4bc0d915925fab71066e54dc0a65ae8890ee28a858569c6f4e91
SHA512188f02de780f6088c60bf8a973ea612da4298ebbc39558c26ad9ab7256337e714a3c219febac39964d9d3a9f4bf3cafe1b5ff8ed5e2cac7e564ba783befd701b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5580f0c11adb7f10392dc63ca9378f9a3
SHA1a430b1bd6168783fb9173b563371f88539dbf5fc
SHA256465f4a7bb06c86ffab7be59cbf546104d39b109ed84f71824abb5f5c2325f7d5
SHA5129eecf8e9c73172d8c9862bee61b06e0a0f2ae83da3c58441b7335c3dbf59ff7ba2f6e393bd83bafbd677f57b1657434462003bec8a3c7cc056168db7931b8625
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56e3f776bd582bd4e377b030c4330a178
SHA1dd58b9810f07878278de2036a17e1aec23587a97
SHA256609a34efb4107d322472266eef4ac69204444a045698b453689b55f80baeed8c
SHA5128c847be13c09d94fa4498d07a2ae1a8e876bede99b9260485f96689a5cd394ce278d6063592c34d751840d3e391487c7caa6252a127bd1f8a86b2555bf2ea72c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b15600533bf87d4b4a7299ed50ac01d9
SHA10b4f4da57909cccd02b5645e698af1c28d1a299f
SHA256733222df1ed0521efa3b2364244f2721f20ff97d1b6df2b5d5ce943241ea8581
SHA5122df9b04b0e989f926fd08c2c024dd3016eda07d06aad40bfe329646200e259207353a5d4dc342a95a0f20e60b7af84cd35a62c8a79010c776b84c01cec969465
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5af4b7c4a9857234c169790a633b6d0b1
SHA1d03d7cd0c84cdf9e90bf250e35dba19772db201d
SHA2560272ba7a536684446cd80cf179dc04936c453eb9b5deccce7ebb4abcf6bc29da
SHA512b11dafaa11c1ef4e0df5dac986473399649f8496a187f074695b12945149c65b1d1b309611c7cebdf44743db211b4f9151a2559936f7990127e36013053ca9b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f8b92a0049e3019423143ec39ee197cf
SHA1ddf77fec9704cf454b5eaeb08164bcb5a842ff3f
SHA256394d9a35ad2050131a9dd18a7e9418ca39a28e2b85726b9035866b4667112383
SHA512626fb99c08a7abc583d3f379ed018611acb5c0bf02b5544dcdf6b67d6f8d8a77fe9fed597778448379412da4e553a36ee97d2057c0fd6d495f2134b817ffd72f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57b1b787e294e1ed1289eab997d8e1649
SHA1eab44c984cc0cea718b3f2b57ede4927e2481cae
SHA2569961c6aabb8679e03a023a0952ff511cae491545b08888358e6d623b53576c64
SHA512ea79b2158c557099bf571d70a158df1c7bca551f74992fcae8d1b7b78aa125771f4151ff1a6653e55571b0c5bdaa34bf5fc6048aeaddb4c6dbf9a792f48bdf39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53b58a1988112c8173357051defe227a8
SHA1b4f1b2a7bc8342a957fc643881d10daa89c9566f
SHA2567ea01dcf05c04927d9c1072cdbf82a1f2b6de56f18319eb4e90a2e46012085c3
SHA5128efd4e6b349936f7a431eaf31d495e66174e074c9e36602ef49527afe72f009f809b335b971685045c13c93bf012eb105a2fdd61710198771236b38916763ec2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53b58a1988112c8173357051defe227a8
SHA1b4f1b2a7bc8342a957fc643881d10daa89c9566f
SHA2567ea01dcf05c04927d9c1072cdbf82a1f2b6de56f18319eb4e90a2e46012085c3
SHA5128efd4e6b349936f7a431eaf31d495e66174e074c9e36602ef49527afe72f009f809b335b971685045c13c93bf012eb105a2fdd61710198771236b38916763ec2
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf